solution brief

Results 126 - 150 of 198Sort Results By: Published Date | Title | Company Name

New SANS 20 Updates Require Keys and Certificates Be Protected

Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi

Solution Brief: Cisco UDC: The Optimal Infrastructure for Microsoft Environments and Applications

Published By: Cisco     Published Date: Jan 05, 2015
Cisco Unified Data Center unifies compute, storage, netw orking, virtualization, and management into a single platform. The result is operational simplicity and business agility -- essential for cloud computing and deploying IT as a Service.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

Solution Briefs: Cisco and EMC VSPEX

Published By: Cisco     Published Date: Jan 05, 2015
Many organizations decide to adopt a cloud computing solution to overcome these challenges. A Microsoft private cloud offers deep application insight, a comprehensive cross-platform approach, best-in-class performance, and the power to run, migrate, or transition your applications out to the public cloud when you want.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

BYOD Policy: It’s Protection, Not Paperwork

Published By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief to ensure your organizations bring-your-own-device (BYOD) policy is a win-win situation.
Tags : 
enterprise mobile, byod, bring your own device, byod policy, byod strategy, mobility services, it management, mobile computing
    
Enterprise Mobile

Mobility Management: How to Address Management Challenges in a Modern Mobile Landscape

Published By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief and learn how to address management challenges while reaping the rewards that mobility has to offer.
Tags : 
enterprise mobile, mobility management, management strategy, risk management, mobility, enterprise applications, application risk management, enterprise mobility management
    
Enterprise Mobile

Application Consternation

Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Employees today want more—and they need more—if they’re going to stay productive from anywhere, which is usually the primary goal of having mobile devices in the first place. The right apps can enhance employee productivity, reduce expenses, and increase profitability which means that the decisions you make about the apps your organization uses are among the most important decisions your organization makes. No pressure, right? Our Mobile Application Development solution brief covers: App delivery Providing support for apps Securing apps
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications
    
Enterprise Mobile

Preparing for Future Attacks

Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, firewalls, hacker detection
    
Symantec

Preparing for Future Attacks

Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, firewalls
    
Symantec

Preparing for Future Attacks

Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, encryption, firewalls
    
Symantec

Preparing for Future Attacks

Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
Symantec

Preparing for Future Attacks

Published By: Symantec     Published Date: Nov 19, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
Symantec

Secure Mobility: Windows Server 2012 helps Tame the BYOD Tide

Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell

Windows Server 2012: Security in the Enterprise

Published By: Dell     Published Date: Oct 24, 2014
The cloud, virtualization, and virtual desktop infrastructure (VDI) help make IT's life easier — and the whole organization more agile — but each of these features also presents serious security challenges. Although there is no one-size-fits-all solution to managing security in the enterprise 2.0 world, the enhanced security features and user-centric offerings in Microsoft Windows Server 2012 make security a much more comfortable proposition for IT. Read this technology brief to learn how Windows Server 2012 helps to mitigate risks and streamline compliance, as well.
Tags : 
virtualization, vdi, it compliance, it security
    
Dell

Achieving Business Agility Through An Agile Data Center

Published By: Symantec     Published Date: Oct 20, 2014
Regardless of where data resides, in a physical, virtual, or cloud environment, Symantec helps businesses realize the scalability and cost benefits of the agile data center. Read the Solutions Brief, “Achieving Business Agility through an Agile Data Center” to learn more.
Tags : 
symantec, business agility, data center, it agility, infrastructure, network architecture, backup and recovery, data protection
    
Symantec

Solution Brief: From Mobile Applications to User Enablement in Three Easy Steps

Published By: bigtincan     Published Date: Oct 10, 2014
Enabling the mobile workforce to be productive is the ultimate goal of any mobile business initiative. While the idea that mobile devices like the iPad, Galaxy Tab and today’s leading smartphones can change how users work in the enterprise is well established, the real challenge is how to enable a mobile workforce to have device access to all the different content they need to do their job without having to circumvent security and content governance objective or require users to learn a mix of consumer oriented software tools and work in different user interfaces in order to be productive. Viewing, editing, annotating and sharing content must be available from the same application.
Tags : 
mobile apps, user enablement, mobile workforce, mobile content
    
bigtincan

HP ConvergedSystem 300 for Virtualization Solution Brief

Published By: HP     Published Date: Aug 25, 2014
"If your company is ready for virtualization, but you’re concerned about the complexity and cost, HP has an easy-to-deploy, easy-to-manage, easy-to-support solution you can order in minutes and deploy in weeks Taking efficiency to new heights, HP ConvergedSystem 300 for Virtualization is a virtualized, workload-optimized, rack serverbased system that includes everything you need in a single, easy-to-order, “converged” package. Read this solution brief to learn more."
Tags : 
converged system, server, complexity, storage, networking, virtualization, data center, cloud
    
HP

Solution brief:  Fast track open source virtualization - HP RA for Red Hat on ConvergedSystem 700x

Published By: HP     Published Date: Aug 25, 2014
Virtualization offers significant agility and efficiency benefits. Pre-tested and optimized solutions from HP and Red Hat® are your fastest—and most cost-effective—path to get there. HP and Red Hat—two trusted business partners—have collaborated to create an answer. HP RA for Red Hat on ConvergedSystem 700x combines proven HP Converged Infrastructure components—to speed virtual server deployments—with open-source Red Hat Enterprise Virtualization software. The result is a compelling, cost-effective platform for consolidating your Linux systems. Read this solution brief to learn more.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
    
HP

Solution Brief: IT Agility Delivered: Cisco Unified Computing System

Published By: Cisco     Published Date: Aug 18, 2014
Dive into the key factors that enable Cisco Unified Computing System, powered by the Intel Xeon® processor, to change the way IT organizations work. Download the brief to learn how Cisco UCS can help IT become an integrated, strategic part of your organization.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade
    
Cisco

Protecting PoS Environments Against Multi-Stage Attacks

Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale, software development
    
Symantec Corporation

Protect your brand with Alert Logic PCI DSS compliance solutions

Published By: Alert Logic     Published Date: Jun 12, 2014
Alert logic’s cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logic’s solutions and the unique benefits offered.
Tags : 
pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic

Solution Brief: Enterprise Data Protection and App Access for Healthcare

Published By: Nativeflow     Published Date: Jun 06, 2014
Download the solution brief to learn more about protecting your organization’s enterprise data.
Tags : 
nativeflow, healthcare, enterprise app, physicians, mobile app, doctors, healthcare solutions, data encryption
    
Nativeflow

Adapt Layered Defenses for Comprehensive Malware Protection

Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee

Making the Most of Your CRM: How Best-in-Class Sales Teams Maximize Revenue and Customer Experience

Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy
    
Oracle

Development and Test on Amazon Web Services

Published By: Amazon     Published Date: Nov 07, 2013
An easy way to get started using Amazon Web Services is by deploying development and test workloads. This solution briefing outlines some of the challenges that customers face with these workloads, and how AWS can help address them. In addition, it provides an overview of AWS, highlights some key services for these scenarios and provides links so that you can obtain more information about any service that you are interested in.
Tags : 
amazon web services, aws, aws cloud, cloud services, cloud computing, development, test, testing
    
Amazon

Your Apps Solution Brief

Published By: GoodData     Published Date: Oct 14, 2013
See why Powered By GoodData does it so well
Tags : 
gooddata, solution brief, apps, data, big data
    
GoodData
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.